The search functionality is under construction.
The search functionality is under construction.

Keyword Search Result

[Keyword] TE(21534hit)

9981-10000hit(21534hit)

  • Theoretical Analysis of Route Expected Transmission Count in Multi-Hop Wireless Networks

    Kazuyuki MIYAKITA  Keisuke NAKANO  Masakazu SENGOKU  Shoji SHINODA  

     
    PAPER-Network

      Vol:
    E91-B No:8
      Page(s):
    2533-2544

    In multi-hop wireless networks, communication quality depends on the route from a source to a destination. In this paper, we consider a one-dimensional multi-hop wireless network where nodes are distributed randomly and theoretically analyze the relation between communication quality and routing policy using a measure called the Expected Transmission Count (ETX), which is the predicted number of data transmissions required to send a packet over that link, including retransmissions. First, we theoretically analyze the mean length of links, the mean number of hops, and the mean route ETX, which is the sum of the ETXs of all links in a route, of Longest Path Routing (LPR), and Shortest Path Routing (SPR). Second, we propose Adjustable Routing (AR), an approximation to Optimum Routing (OR), which minimizes route ETX. We theoretically compute the above characteristic values of AR. We also theoretically compute a lower bound of the mean route ETX of OR. We compare LPR, SPR, and OR using the results of analyses and show differences between these algorithms in the route ETX.

  • An Integrated Calculation Method to Predict Arc Behavior

    Xingwen LI  Degui CHEN  

     
    LETTER-Arc Discharge & Related Phenomena

      Vol:
    E91-C No:8
      Page(s):
    1228-1229

    The precision of magnetic field calculation is crucial to predict the arc behavior using magnetohydrodynamic (MHD) model. A integrated calculation method is proposed to couple the calculation of magnetic field and fluid dynamics based on the commercial software ANSYS and FLUENT, which especially benefits to take into account the existence of the ferromagnetic parts. An example concerning air arc is presented using the method.

  • Low-Complexity Watermarking Based on Entropy Coding in H.264/AVC

    Young-Ho SEO  Hyun-Jun CHOI  Chang-Yeul LEE  Dong-Wook KIM  

     
    PAPER-Cryptography and Information Security

      Vol:
    E91-A No:8
      Page(s):
    2130-2137

    This paper is to propose a digital watermarking to protect the ownership of a video content which is compressed by H.264/AVC main profile. This scheme intends to be performed during the CABAC (Context-based Adaptive Binary Arithmetic Coding) process which is the entropy coding of the main profile. It uses the contexts extracted during the context modeling process of CABAC to position the watermark bits by simply checking the context values and determining the coefficients. The watermarking process is also as simple as replacing the watermark bit with the LSB (Least Significant Bit) of the corresponding coefficient to be watermarked. Experimental results from applying this scheme and attacking in various ways such as blurring, sharpening, cropping, Gaussian noise addition, and geometrical modification showed that the watermark embedded by this scheme has very high imperceptibility and robustness to the attacks. Thus, we expect it to be used as a good watermarking scheme, especially in the area that the watermarking should be performed during the compression process with requiring minimal amount of process for watermarking.

  • Video Watermarking by Space-Time Interest Points

    Lei-Da LI  Bao-Long GUO  Jeng-Shyang PAN  

     
    LETTER-Cryptography and Information Security

      Vol:
    E91-A No:8
      Page(s):
    2252-2256

    This letter presents a novel robust video watermarking scheme based on space-time interest points. These points correspond to inherent structures of the video so that they can be used as synchronization signals for watermark embedding and extraction. In the proposed scheme, local regions are generated using the space-time interest points, and the watermark is embedded into all the regions by quantization. It is a blind scheme and the watermark can be extracted from any position of the video. Experimental results show that the watermark is invisible and it can robustly survive traditional signal processing attacks and video-oriented attacks.

  • A New Frequency Partitioning and Allocation of Subcarriers for Fractional Frequency Reuse in Mobile Communication Systems

    Seung Su HAN  Jongho PARK  Tae-Jin LEE  Hyun Gi AHN  Kyunghun JANG  

     
    LETTER-Wireless Communication Technologies

      Vol:
    E91-B No:8
      Page(s):
    2748-2751

    Some OFDMA-based wireless commuication systems, e.g., Wireless Broadband Internet (WiBro) or Worldwide interoperability for Microwave Access (WiMAX), support frequency reuse of 1 to maximize spectral efficiency. One of the efficient methods to reduce co-channel interference (CCI) caused by frequency reuse is fractional frequency reuse (FFR). In this paper, we propose and validate a novel frequency partitioning method and subcarrier assignment mechanism to improve system and individual capacity of mobile systems using FFR.

  • Analysis and Optimization for a Contactor with Feedback Controlled Magnet System

    Yingyi LIU  Degui CHEN  Chunping NIU  Liang JI  Weixiong TONG  

     
    PAPER-Contactors & Circuit Breakers

      Vol:
    E91-C No:8
      Page(s):
    1273-1279

    In the optimum design of AC contactors, it is important to analyze the dynamic behavior. Moreover, movable contact and core bounces have remarkable effect on the lifetime of contactors. According to a new kind of contactor with feedback controlled magnet system, this paper builds two different sets of periodically inter-transferred equations to obtain the dynamic characteristics of the contactor. The equations describe the coupling of the electric circuit, electromagnetic field and mechanical system taking account of the influence of friction. Then, the paper gives an optimum design to the dimension and the duty ratio of the contactor' pulse modulated wave (PWM) under different exciting, and proves, by experiment and simulation, that the bounce time of the contactor working in the optimized duty ratio is much less than that of the general AC contactors.

  • An Efficient Bottom-up Filtering of XML Messages by Exploiting the Postfix Commonality of XPath Queries

    Jaehoon KIM  Youngsoo KIM  Seog PARK  

     
    PAPER-Contents Technology and Web Information Systems

      Vol:
    E91-D No:8
      Page(s):
    2124-2133

    Recently, for more efficient filtering of XML data, YFilter system has been suggested to exploit the prefix commonalities that exist among path expressions. Sharing the prefix commonality gives the benefit of improving filtering performance through the tremendous reduction in filtering machine size. However, exploiting the postfix commonality can also be useful for an XML filtering situation. For example, when a stream of XML messages does not have any defined schema, or users cannot remember the defined schema exactly, users often use the partial matching path queries which begins with the descendant axis ("//"), e.g., '//science/article/title', '//entertainment/article/title', and '//title'. If so, the registered XPath queries are most likely to have the postfix commonality, e.g., the sample queries share the partial path expressions 'article/title' and 'title'. Therefore, in this paper, we introduce a bottom-up filtering approach exploiting the postfix commonality against the top-down approach of YFilter exploiting the prefix commonality. Some experimental results show that our method has better filtering performance when registered XPath queries mainly consist of the partial matching path queries with the postfix commonality.

  • A New Blind Adaptive Array Antenna Based on CMA Criteria for M-Ary/SS Signals Suitable for Software Defined Radio Architecture

    Miho KOZUMA  Atsushi SASAKI  Yukihiro KAMIYA  Takeo FUJII  Kenta UMEBAYASHI  Yasuo SUZUKI  

     
    PAPER

      Vol:
    E91-A No:8
      Page(s):
    1982-1989

    M-ary/SS is a version of Direct Sequence/Spread Spectrum (DS/SS) aiming to improve the spectral efficiency employing orthogonal codes. However, due to the auto-correlation property of the orthogonal codes, it is impossible to detect the symbol timing by observing correlator outputs. Therefore, conventionally, a preamble has been inserted in M-ary/SS signals. In this paper, we propose a new blind adaptive array antenna for M-ary/SS systems that combines signals over the space axis without any preambles. It is surely an innovative approach for M-ary/SS. The performance is investigated through computer simulations.

  • MIMO Broadcast Transmission Strategy over Fast Time-Varying Channels

    Hongmei WANG  Xibin XU  Ming ZHAO  Weiling WU  Yan YAO  

     
    LETTER-Wireless Communication Technologies

      Vol:
    E91-B No:8
      Page(s):
    2731-2735

    In time-varying channels, the channel state information available at the transmitter (CSIT) is outdated due to inherent time delay between the uplink channel estimation and the downlink data transmission in TDD systems. In this letter, we propose an iterative precoding method and a linear decoding method which are both based on minimum mean-squared error (MMSE) criteria to mitigate the interference among data streams and users created by outdated CSIT for multiuser MIMO downlink systems. Analysis and simulation results show that the proposed method can effectively reduce the impairment of the outdated CSIT and improve the system capacity.

  • Alternative Transform for Residual Blocks in H.264/AVC

    Sung-Chang LIM  Dae-Yeon KIM  Yung-Lyul LEE  

     
    LETTER-Image

      Vol:
    E91-A No:8
      Page(s):
    2272-2276

    In this paper, an alternative transform based on the correlation of the residual block is proposed for the improvement of the H.264/AVC coding efficiency. A discrete sine transform is used alternately with a discrete cosine transform in order to greatly compact the energy of the signal when the correlation coefficients of the signal are in the range of -0.5 to 0.5. Therefore, the discrete sine transform is suggested to be used in conjunction with the discrete cosine transform in H.264/AVC. The alternative transform selecting the optimal transform between two transforms by using rate-distortion optimization shows a coding gain compared with H.264/AVC. The proposed method achieves a PSNR gain of up to 1.0 dB compared to JM 10.2 at relatively high bitrates.

  • Parallel Architecture for 2-D Discrete Wavelet Transform with Low Energy Consumption

    Nozomi ISHIHARA  Koki ABE  

     
    PAPER-Digital Signal Processing

      Vol:
    E91-A No:8
      Page(s):
    2068-2075

    A novel two-dimensional discrete wavelet transform (2-DDWT) parallel architecture for higher throughput and lower energy consumption is proposed. The proposed architecture fully exploits full-page burst accesses of DRAM and minimizes the number of DRAM activate and precharge operations. Simulation results revealed that the architecture reduces the number of clock cycles for DRAM memory accesses as well as the DRAM power consumption with moderate cost of internal memory. Evaluation of the VLSI implementation of the architecture showed that the throughput of wavelet filtering was increased by parallelizing row filtering with a minimum area cost, thereby enabling DRAM full-page burst accesses to be exploited.

  • An Efficient Reversible Image Authentication Method

    Seungwu HAN  Masaaki FUJIYOSHI  Hitoshi KIYA  

     
    PAPER

      Vol:
    E91-A No:8
      Page(s):
    1907-1914

    This paper proposes an image authentication method that detects tamper and localizes tampered areas efficiently. The efficiency of the proposed method is summarized as the following three points. 1) This method offers coarse-to-fine tamper localization by hierarchical data hiding so that further tamper detection is suppressed for blocks labeled as genuine in the uppper layer. 2) Since the image feature description in the top layer is hidden over an image, the proposed method enciphers the data in the top layer rather than enciphers all data in all layers. 3) The proposed method is based on the reversible data hiding scheme that does not use highly-costed compression technique. These three points makes the proposed method superior to the conventional methods using compression techniques and methods using multi-tiered data hiding that requires integrity verification in many blocks even the image is genuine. Simulation results show the effectiveness of the proposed method.

  • On the Stopping Distance and Stopping Redundancy of Finite Geometry LDPC Codes

    Hai-yang LIU  Xiao-yan LIN  Lian-rong MA  Jie CHEN  

     
    PAPER-Coding Theory

      Vol:
    E91-A No:8
      Page(s):
    2159-2166

    The stopping distance and stopping redundancy of a linear code are important concepts in the analysis of the performance and complexity of the code under iterative decoding on a binary erasure channel. In this paper, we studied the stopping distance and stopping redundancy of Finite Geometry LDPC (FG-LDPC) codes, and derived an upper bound of the stopping redundancy of FG-LDPC codes. It is shown from the bound that the stopping redundancy of the codes is less than the code length. Therefore, FG-LDPC codes give a good trade-off between the performance and complexity and hence are a very good choice for practical applications.

  • On Generalized Feistel Structures Using the Diffusion Switching Mechanism

    Taizo SHIRAI  Kiyomichi ARAKI  

     
    PAPER-Cryptography and Information Security

      Vol:
    E91-A No:8
      Page(s):
    2120-2129

    To design secure blockciphers, estimating immunity against differential attack and linear attack is essential. Recently, Diffusion Switching Mechanism (DSM) is proposed as a design framework to enhance the immunity of Feistel structure against differential attack and linear attack. In this paper, we give novel results on the effect of DSM on three generalized Feistel structures, i.e. Type-I, Type-II and Nyberg's structures. We first show a method for roughly estimating lower bounds of a number of active S-boxes in Type-I and Type-II structures using DSM. Then we propose an improved search algorithm to find lower bounds for generalized structures efficiently. Experimental results obtained by the improved algorithm show that DSM raises lower bounds for all of the structures, and also show that Nyberg's structure has the slowest diffusion effect among them when SP-type F-functions are used.

  • Leakage Current and Floating Gate Capacitor Matching Test

    Weidong TIAN  Joe R. TROGOLO  Bob TODD  

     
    INVITED PAPER

      Vol:
    E91-C No:8
      Page(s):
    1315-1320

    Capacitor mismatch is an important device parameter for precision analog applications. In the last ten years, the floating gate measurement technique has been widely used for its characterization. In this paper we describe the impact of leakage current on the technique. The leakage can come from, for example, thin gate oxide MOSFETs or high dielectric constant capacitors in advanced technologies. SPICE simulation, bench measurement, analytical model and numerical analyses are presented to illustrate the problem and key contributing factors. Criteria for accurate capacitor systematic and random mismatch characterization are developed, and practical methods of increasing measurement accuracy are discussed.

  • Analysis of the Energy-QoS Tradeoff for Contention-Based Wireless Sensor Networks with Synchronous Wakeup Patterns

    Jun LUO  Ling-ge JIANG  Chen HE  

     
    LETTER-Network

      Vol:
    E91-B No:8
      Page(s):
    2711-2715

    To conserve energy, periodic active/sleep dynamics is adopted in wireless sensor networks. At the same time, the QoS guarantees, such as packet delay, packet loss ratio and network throughput need to be satisfied. We develop a finite queuing model for sensor nodes and derive network performance for contention-based wireless sensor networks with synchronous wakeup patterns. Furthermore, the impact of active/sleep duty cycle, time scale and node buffer size on the tradeoff between energy efficiency and QoS guarantees is studied based on the model. Simulation results well match our analytical results and validate the accuracy of our model and approach.

  • On Bit Rate Reduction of Inter-Channel Communication for a Binaural Hearing Assistance System

    Yoshifumi CHISAKI  Ryouji KAWANO  Tsuyoshi USAGAWA  

     
    LETTER

      Vol:
    E91-A No:8
      Page(s):
    2041-2044

    A binaural hearing assistance system based on the frequency domain binaural model has been previously proposed. The system can enhance a signal coming from a specific direction. Since the system utilizes a binaural signal, an inter-channel communication between left and right subsystems is required. The bit rate reduction in inter-channel communication is essential for the detachment of the headset from the processing system. In this paper, the performance of a system which uses a differential pulse code modulation codec is examined and the relationship between the bit rate and sound quality is discussed.

  • High Resolution DOA Estimation Using Unwrapped Phase Information of MUSIC-Based Noise Subspace

    Koichi ICHIGE  Kazuhiko SAITO  Hiroyuki ARAI  

     
    PAPER

      Vol:
    E91-A No:8
      Page(s):
    1990-1999

    This paper presents a high resolution Direction-Of-Arrival (DOA) estimation method using unwrapped phase information of MUSIC-based noise subspace. Superresolution DOA estimation methods such as MUSIC, Root-MUSIC and ESPRIT methods are paid great attention because of their brilliant properties in estimating DOAs of incident signals. Those methods achieve high accuracy in estimating DOAs in a good propagation environment, but would fail to estimate DOAs in severe environments like low Signal-to-Noise Ratio (SNR), small number of snapshots, or when incident waves are coming from close angles. In MUSIC method, its spectrum is calculated based on the absolute value of the inner product between array response and noise eigenvectors, means that MUSIC employs only the amplitude characteristics and does not use any phase characteristics. Recalling that phase characteristics plays an important role in signal and image processing, we expect that DOA estimation accuracy could be further improved using phase information in addition to MUSIC spectrum. This paper develops a procedure to obtain an accurate spectrum for DOA estimation using unwrapped and differentiated phase information of MUSIC-based noise subspace. Performance of the proposed method is evaluated through computer simulation in comparison with some conventional estimation methods.

  • A Passive 3D Face Recognition System and Its Performance Evaluation

    Akihiro HAYASAKA  Takuma SHIBAHARA  Koichi ITO  Takafumi AOKI  Hiroshi NAKAJIMA  Koji KOBAYASHI  

     
    PAPER

      Vol:
    E91-A No:8
      Page(s):
    1974-1981

    This paper proposes a three-dimensional (3D) face recognition system using passive stereo vision. So far, the reported 3D face recognition techniques have used active 3D measurement methods to capture high-quality 3D facial information. However, active methods employ structured illumination (structure projection, phase shift, moire topography, etc.) or laser scanning, which is not desirable in many human recognition applications. Addressing this problem, we propose a face recognition system that uses (i) passive stereo vision to capture 3D facial information and (ii) 3D matching using an ICP (Iterative Closest Point) algorithm with its improvement techniques. Experimental evaluation demonstrates efficient recognition performance of the proposed system compared with an active 3D face recognition system and a passive 3D face recognition system employing the original ICP algorithm.

  • Fundamental Measurement of Electromagnetic Field Radiated from a Coaxial Transmission Line Caused by Connector Contact Failure

    Yu-ichi HAYASHI  Hideaki SONE  

     
    PAPER-Signal Transmission

      Vol:
    E91-C No:8
      Page(s):
    1306-1312

    When contact failure occurs in a connector in a coaxial HF signal transmission line, an electromagnetic field is radiated around the line. We have measured the electromagnetic field and examined the characteristics of such radiation. The results show that the radiation is related to the contact resistance and the symmetry of the distribution of contact points at the connector. When contact resistance is low, radiation is observed at resonant frequencies related to the length of the transmission line. If a connector has axially asymmetric contact points, its radiation is higher than that when the contact points are symmetric. We show that if contact points in a connector are axially symmetrical with resistance lower than 0.25 Ω, the electromagnetic interference caused by the connector contact failure is as low as the background noise.

9981-10000hit(21534hit)